SSH event and webinar calendar

 

Upcoming events and webinars

Gartner_logo.svg

identity & access management summit
May 12-13, 2022 | London, uk

Identity and Access Management (IAM)

Get the latest insights on identity governance and administration, security, and privacy.

Join our CEO, Teemu Tunkelo, for his presentation about the latest developments in defensive cybersecurity. On Friday, May 13th, 2022 at 11:15, room Arora 6.

Come and meet us at the booth 501.

Learn more >

csn_logo

cybersecurity nordic 2022
May 12-13, 2022 | helsinki, finland

Politics, economy, reality and future of cybersecurity

Leading cybersecurity specialists from the Nordics meet to provide insights into current issues within the field of cybersecurity.

Meet us at the booth SI3.

Learn more >

Kuppingercole

European identity and cloud conference 2022
May 10-13, 2022 | Berlin, Germany

Decentralized identity & cybersecurity

Insights from the industry leaders into the latest cybersecurity trends, digital identity, and identity management.

Learn more >

Gartner_logo.svg

Identity & Access Management Summit
august 22 – 24, 2022 | Las Vegas, NV

Securing Constant Change: Enabling Resilient Business

Share valuable insights and get a comprehensive update on privileged access management (PAM), IAM programs and strategy, single sign-on, multifactor authentication (MFA), passwordless methods and more.

Learn more >

Past events and webinars

GISEC_Global_2022_logo

GISEC global 2022

For a cyber-safe, interconnected world

One of the most established networking and business events for the cyber and IT security industry. Drive strategic collaborations and an empowering exchange of new-age cybersecurity tactics and ideas.

ISACA_new

Online event

Fix a critical hole in your security posture

A single SSH key can make you fail your next IT audit or turn you into tomorrow’s beach headline. Join our co-hosted webinar with our friends at ISACA to learn how to use purpose-built software and automation to prevent this.

information-security-media-group-ismg-logo-E4459BC5FA-seeklogo.com
Webinar co-hosted by ISMG

Can SMEs automate access to multi-cloud IT?

Learn how medium-sized companies can automate most of their manual privileged access management (PAM) tasks, deploy the solution within days and manage the access of internal and external IT workforce with minimal risk of privilege abuse. 

Onelogin_SSH_COM_on-demand
On-demand Webinar with OneLogin

Saving admins from themselves

Multi-cloud environments (AWS, Azure, Google Cloud) and DevOps require cloud-speed operations. They have also opened new types of vulnerabilities that need new types of counter measures.

Whitehall_Media_logo_STRAPLINE
IDM London 2019

Say no to standing privileges, go credentialess

Why permanent credentials are a risk in IT and how critical IT environments can be made passwordless and credentialess. 

Whitehall_Media_logo_STRAPLINE
IDM Utrecht 2019

Modern access mgmt for hybrid and multi-cloud 

 Dynamic hybrid and cloud environments have different privileged user types who need to access shifting target servers. While cloud environments can be complex and ever-changing, many legacy solutions are built on yesterday’s architecture and tend to cause huge operational and business friction.

angelbeat
Event

Angelbeat Boston 2019

The unique event to learn about top IT issues, featuring keynotes from the world's two largest technology firms: Microsoft and Amazon Web Services (AWS).